General
-
Target
3254c6ac87104fd34c68c9f12a0085cd772cb7eb909c3c08aad8336f32b98cdd.elf
-
Size
147KB
-
Sample
241201-crzbvaxrdr
-
MD5
f6c738f8fde7372f91168a8239a02aa8
-
SHA1
64f0677fc9f7fa499a2f8c78598b8dd7078af4ee
-
SHA256
3254c6ac87104fd34c68c9f12a0085cd772cb7eb909c3c08aad8336f32b98cdd
-
SHA512
c20f19ddd4fd5eced11d737de69eb140ad7924a6e5b94aa3a6f471cd1b7fd967b71f550f503ac4933cee6a3d80a4cd150a9663aedc991c3b4b813834ea43deff
-
SSDEEP
3072:OiKKvnBnGyClrUn4UloLmpMguHcUgVUHalw7W6uH0JsfCJvhL2TjvEpkBjqBymwX:OiKKvnBnGyirUn4UloLmpMguHcUgVUHq
Behavioral task
behavioral1
Sample
3254c6ac87104fd34c68c9f12a0085cd772cb7eb909c3c08aad8336f32b98cdd.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
3254c6ac87104fd34c68c9f12a0085cd772cb7eb909c3c08aad8336f32b98cdd.elf
-
Size
147KB
-
MD5
f6c738f8fde7372f91168a8239a02aa8
-
SHA1
64f0677fc9f7fa499a2f8c78598b8dd7078af4ee
-
SHA256
3254c6ac87104fd34c68c9f12a0085cd772cb7eb909c3c08aad8336f32b98cdd
-
SHA512
c20f19ddd4fd5eced11d737de69eb140ad7924a6e5b94aa3a6f471cd1b7fd967b71f550f503ac4933cee6a3d80a4cd150a9663aedc991c3b4b813834ea43deff
-
SSDEEP
3072:OiKKvnBnGyClrUn4UloLmpMguHcUgVUHalw7W6uH0JsfCJvhL2TjvEpkBjqBymwX:OiKKvnBnGyirUn4UloLmpMguHcUgVUHq
Score9/10-
Contacts a large (19737) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-